About your Search

20120930
20121008
Search Results 0 to 1 of about 2
sucha and the "uss john c. stennis" is on the west coast. they have the aegis air defense system. the u.s. fleet says the two strike groups will provide a combat-ready force to protect and defend the collective maritime interests of the united states and its allies in the asia pacific region. the u.s. also plans to deploy new f-35 stealth fighter jets in the region. the f-35 is now in its final stage of development. it has an advanced network system to connect the aircraft with ground-based radar and aegis vessels which can provide integrated information to the pilots. >>> earlier i spoke to nhk world's senior commentator hisashi sua. so, hisashi, is it unusual to have two aircraft carriers in this region at the same time? >> no, it's not that unusual. u.s. navy policy says there should be a presence of twoiers in the region. but this is not always the case because of demands elsewhere, so "uss george washington" has its home base in japan. the "uss john c. stennis" is based on the u.s. west coast but is on its way to the persian gulf to join the fleet. it arrived in the western pacific
sucha near tokyo and the "uss john c. stennis" based on the u.s. west coast are operating together. several vessels equipped with the aegis air definite system are run alongside them. a navy spokesperson says the fleet provides a combat-ready force that protects and defends the collective maritime interests of the united states and its allies and partners. >>> chinese naval commanders put their first aircraft carrier into service last week, but it has no operational aircraft and will be used for training. >>> an international group of hackers has leaked some 120,000 bits of information it claims was stolen from the world's top universities. five japanese universities were among the hackers' targets along with harvard and cambridge. the hacker collector known as ghost shell claims it broke into systems at 100 universities and posted personal information on a website. the data stolen from the university of tokyo may contain the e-mail addresses of its staff members as well as the phone numbers and addresses of its laboratories. the university shut down its computer networks to verify
Search Results 0 to 1 of about 2